Mid Week Cybersecurity Digest: 4 Sep 2024

Yubico Keys Cloned, VMWare Fusion Patch, and Updates about a Fake GlobalProtect pushing malware

The Cybersecurity Digest Newsletter

Date: 4 Sept 2024

Happy Wednesday everyone! I hope that you all like the new format of the newsletter!

Today there are quite a few updates to go through. Some things I definitely recommend reading more into is the Yubico vulnerability, Unit42’s update about the Spoofed GlobalProtect being pushed, and the Manitcora Loader which is a new malware-as-a-service. There have been a lot of patches pushed so far this week. As always check out the patches and CISA advisories and see if you are impacted!

**Please note that Blue Article Titles and gray boxes link directly to other articles or sources used. Additionally, if the background is too dark for text on mobile, try turning off your phones dark mode.

Upcoming In Today's Issue

Notable News

Image generated with DALL-E

Readworthy Research

Image generated with DALL-E

Prevalent Patches

Image generated by DALL-E

CISA Corner

Image generated by DALL-E

CISA KEV Additions

CVE-2021-20123 Draytek VigorConnect Path Traversal Vulnerability

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

CVE-2021-20124 Draytek VigorConnect Path Traversal Vulnerability

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

CVE-2024-7262 Kingsoft WPS Office Path Traversal Vulnerability

Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document

CISA ICS Advisory

Conclusion:

Thank you for reading this edition of the Cybersecurity Digest Newsletter. If you enjoyed this newsletter, please share with someone you know who would benefit from this information.

Have a good rest of your week!

Until next time, Stay Secure!

Reply

or to participate.